CVE-2025-64111
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Tags
Description
Gogs is an open source self-hosted Git service. In version 0.13.3 and prior, due to the insufficient patch for CVE-2024-56731, it's still possible to update files in the .git directory and achieve remote command execution. This issue has been patched in versions 0.13.4 and 0.14.0+dev.
Analysis
Gogs self-hosted Git service v0.13.3 has a command injection vulnerability enabling remote code execution through crafted repository operations.
Technical Context
Gogs v0.13.3 has a CWE-78 OS command injection due to insufficient input validation in Git operations, allowing attackers to inject commands that execute on the Gogs server.
Affected Products
['Gogs <= 0.13.3']
Remediation
Update Gogs. Sanitize all Git operation inputs.
Priority Score
Vendor Status
Share
External POC / Exploit Code
Leaving vuln.today
GHSA-gg64-xxr9-qhjp